2020
DOI: 10.1109/tifs.2019.2929409
|View full text |Cite
|
Sign up to set email alerts
|

VerifyNet: Secure and Verifiable Federated Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
236
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 544 publications
(237 citation statements)
references
References 30 publications
1
236
0
Order By: Relevance
“…VerifyNet tries to protect the users' privacy for the process of training and verify the reliability of the results that are sent back. The issue that the authors' highlight is that while there are several approaches focusing on security and privacy, there is still a problem of clients being able to verify if a server is functioning properly without compromising the users' privacy [98]. As such, the overall goal of this protocol is to address three major problems that federated training often runs into: 1) How to protect the users' privacy in workflow 2) Spoofing 3) How to offer offline support for users There are five rounds in the VerifyNet protocol that are: Initialization, Key Sharing, Masked Input, Unmasking, and Verification, with Fig.…”
Section: Figure 15 Fedcs Protocol Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…VerifyNet tries to protect the users' privacy for the process of training and verify the reliability of the results that are sent back. The issue that the authors' highlight is that while there are several approaches focusing on security and privacy, there is still a problem of clients being able to verify if a server is functioning properly without compromising the users' privacy [98]. As such, the overall goal of this protocol is to address three major problems that federated training often runs into: 1) How to protect the users' privacy in workflow 2) Spoofing 3) How to offer offline support for users There are five rounds in the VerifyNet protocol that are: Initialization, Key Sharing, Masked Input, Unmasking, and Verification, with Fig.…”
Section: Figure 15 Fedcs Protocol Frameworkmentioning
confidence: 99%
“…The authors noted that VerifyNet was receptive to users dropping out of the FL learning process. VerifyNet was also able to achieve high security, but unfortunately, VerifyNet has high communication overheadm [98].…”
Section: Figure 15 Fedcs Protocol Frameworkmentioning
confidence: 99%
“…While this represents a large step-up in terms of addressing critical issues of data privacy and security, recent studies have shown that even in federated learning scenarios several risks can be found, particularly regarding reverse-engineering attacks that can extract sensitive information about the datasets directly from the model [96]. As such, it is imperative that future research addresses privacy-preserving constructs for AI, with some examples including multiparty computation schemes and differential privacy [97].…”
Section: Cybersecurity and Privacymentioning
confidence: 99%
“…By exploiting a secure aggregation protocol and a secretsharing scheme, the privacy of each user-provided model can be guaranteed under an honest-but-curious and active adversarial setting [100], which supports an arbitrary subset of user dropouts. Other than the above schemes, to verify the correctness of the final aggregation result, a privacy-preserving and verifiable federated learning protocol has been designed with a homomorphic hash function and a secret sharing protocol [101]. However, secure multi-party computation may still leak sensitive information during the learning process.…”
Section: Privacy Preservationmentioning
confidence: 99%